22
22
tv
eye 22
favorite 0
quote 0
security agency but i only wanted to see if i could do it so as soon as i heard conversation it was some man and woman talking i listen for like five ten seconds and then i hung up and never did it again it was just to see if i could actually do it and i think the n.s.a. is actually hiring code crack why do they need them well they need to you know to create well actually they need a higher code crackers to increase their capabilities that's that's the job of the national security agency is to break odes so they want to get the best people in the world to help do that and according to edward snowden now we can call this name so according to at snowden's revelations emails phone calls messages a role being tracked so how can the government god i think have access to everything at least in the united states and probably britain great britain i believe they have access to everything because they basically could basically he could intercept all the packets going through the backbone of everything and and now it's there's been some revelations that they've been pretty resourceful at brea
security agency but i only wanted to see if i could do it so as soon as i heard conversation it was some man and woman talking i listen for like five ten seconds and then i hung up and never did it again it was just to see if i could actually do it and i think the n.s.a. is actually hiring code crack why do they need them well they need to you know to create well actually they need a higher code crackers to increase their capabilities that's that's the job of the national security agency is to...
33
33
tv
eye 33
favorite 0
quote 0
national secure. the agency factions at the end they have you on the screen saying where do you asking the question where do you draw the line between the gathering of intelligence that the government has to have and the protection of civil liberties particularly the sanctity of the home and you end with a kind of heartfelt cry you have no right to enter my home come into my home right but as you know i'm sure there in your home right now larry and mine if you have an i phone in your pocket i don't know if you have it right now in your kitchen or your bedroom or your chargin in the bedroom at night as i do the n.s.a. the national security agency can store record store all of your conversation any of your more generally if you have a computer in your home your tweets your e-mail your purchases over online your google searches all of that including your i phone or a smartphone as a g.p.s. all of your movements is all on record to be retrieved at will when the president says we don't listen to your calls
national secure. the agency factions at the end they have you on the screen saying where do you asking the question where do you draw the line between the gathering of intelligence that the government has to have and the protection of civil liberties particularly the sanctity of the home and you end with a kind of heartfelt cry you have no right to enter my home come into my home right but as you know i'm sure there in your home right now larry and mine if you have an i phone in your pocket i...
93
93
Sep 6, 2013
09/13
by
ALJAZAM
tv
eye 93
favorite 0
quote 0
according to new documents released by former national security agency contractor edward notice snowden the nsa has invested billions of dollars in super-fast computers to break transactions including banking transactions, consumer e-commerce, corporate trade secrets and medical records and other confidential information. the documents also show the agency secretly persuaded or legally forced technology companies to provide it with the keys to their encryption program so that it could deroad -- decode billions of enter thet chats and phone calls in the u.s. and across the world. in a 2010 briefing memo for nsa's counterpart, the agency boasted of an aggressive, multi-pronged effort to break widely used internet encryption technologies saying that vast amount of online data previously ignored is now being exploited. the british agency reported it had developed what it called access opportunities to google's encrypted traffic. there are over 400 million users of g mail. other companies targeted by code breakers include yahoo! facebook and microsoft's hot mail. the documents collected by s
according to new documents released by former national security agency contractor edward notice snowden the nsa has invested billions of dollars in super-fast computers to break transactions including banking transactions, consumer e-commerce, corporate trade secrets and medical records and other confidential information. the documents also show the agency secretly persuaded or legally forced technology companies to provide it with the keys to their encryption program so that it could deroad --...
20
20
tv
eye 20
favorite 0
quote 0
security agency was doing at least against americans by violating our constitutional rights to privacy but i do think you know i have some mixed feelings that he did cross the line when he revealed n.s.a. operations that we have against other countries because as we all know all countries spy on each other where state law is a question is hash tag ask make make the most popular one is how can citizens protect that data and communications while still using popular corporate software the first thing i would recommend to the average person on the street is use whenever you're out in the public or using public wi-fi is use of the pm service because what that immediately does is it creates it takes your data and it kind of puts it in the encrypted envelope so people can really intercept and spy on that could a boycott of time to train like i pod and phones like the rise in i'm good go and i said. to and i say. no no i mean this is like the form of hacktivism were you you have you know a group of individuals whether it's like lulz or anonymous and they break into stuff and they try to get th
security agency was doing at least against americans by violating our constitutional rights to privacy but i do think you know i have some mixed feelings that he did cross the line when he revealed n.s.a. operations that we have against other countries because as we all know all countries spy on each other where state law is a question is hash tag ask make make the most popular one is how can citizens protect that data and communications while still using popular corporate software the first...
73
73
Sep 10, 2013
09/13
by
KCSM
tv
eye 73
favorite 0
quote 0
security agency access to those countries citizens data, and i think that is a really important distinction that has gotten lost in the wake of the snowden revelations. say what you will about how well our framework works, we have a framework. >> that is a very good point, a very astute point. as we were talking, back in 2011, the obama administration won an appeal to reverse restrictions on the nsa back in 2008, and those restrictions dealt with the use of intercepted phone calls and e- mails. and you talk about this more? what does this say about the nsa? >> i suspect there will be a re- examination of that opinion to see whether or not that ruling was justified in terms of the needs. i think as was pointed out, and as others have pointed out, there are legitimate need for surveillance that protect the country against threats. the question is whether or not that effort to protect the country oversteps the protection of privacy that all of us are also entitled to, so there is a balance that needs to be struck. as the general counsel pointed out a couple of weeks ago at the german marshall
security agency access to those countries citizens data, and i think that is a really important distinction that has gotten lost in the wake of the snowden revelations. say what you will about how well our framework works, we have a framework. >> that is a very good point, a very astute point. as we were talking, back in 2011, the obama administration won an appeal to reverse restrictions on the nsa back in 2008, and those restrictions dealt with the use of intercepted phone calls and e-...
217
217
Sep 5, 2013
09/13
by
KQED
tv
eye 217
favorite 0
quote 0
much more than the national security agency did. and the details on their priorities is what they were spending it on all had been secret for years. so this document, 200 pages almost, really outlines to congress what this money is being spent owhat parts of the world what, kinds of intelligence going toering, and that had all been secret for pretty much ever. >> woodruff: a lot of details in there. kate martin, stewart baker, let me bring the two of you into this conversation. first, stewart baker, what about this black budget? is this information that should be in the public realm? >> no, under no circumstances. even the-- you know, 95% of it was withheld by the "post" which was persuaded that it was too dangerous to release, and even the things they released tell the syrians and the iranians and al qaeda what we been them, and more importantly what, they have successfully hidden from us. that tells them what's working and what's not. it's going to set us back. >> woodruff: so you're saying it-- it's done damage, it will do damage
much more than the national security agency did. and the details on their priorities is what they were spending it on all had been secret for years. so this document, 200 pages almost, really outlines to congress what this money is being spent owhat parts of the world what, kinds of intelligence going toering, and that had all been secret for pretty much ever. >> woodruff: a lot of details in there. kate martin, stewart baker, let me bring the two of you into this conversation. first,...
112
112
Sep 7, 2013
09/13
by
KCSM
tv
eye 112
favorite 0
quote 0
but the national security agency has seemed to crack the code and have been doing so at least since the year 2000. this according to the latest secret documents leaked by edward snowden. we now know that both the n.s.a. and its british counterpart the gchq has made millions of attempts to gain access. >> a huge breakthrough in 2010 a way was made it monitor large amounts of data flowing through the fiberoptic cables. the spy agencies found ways to again access through virtue private networks which are frequently used by businesses and privacy conscious users to conceal i.p. addresses. that means the digital scrambling used to protect trade secrets, medical records and more have been unscrambled by the n.s.a. and the spying organization has been covertly working to get access to data. both the n.s.a. spends more than $250 million a year on its enabling project which actively engages the u.s. and foreign i.t. industries to covertly influence and leverage their commercial product designed to make them exploitable. it is unclear which technology companies are working with the n.s.a. but sno
but the national security agency has seemed to crack the code and have been doing so at least since the year 2000. this according to the latest secret documents leaked by edward snowden. we now know that both the n.s.a. and its british counterpart the gchq has made millions of attempts to gain access. >> a huge breakthrough in 2010 a way was made it monitor large amounts of data flowing through the fiberoptic cables. the spy agencies found ways to again access through virtue private...
54
54
Sep 11, 2013
09/13
by
CSPAN
tv
eye 54
favorite 0
quote 0
that's setting the policy and dealing with the data, not the national security agency. so what i would say is maybe d.h.s. doesn't need so much a bigger dog as a leash. and authorizing legislation can provide that kind of reassurance to the american people. >> thank you for those comments. how do we better honor the loss of all those lives 2 years ago this morning? do -- 12 years ago this morning? do we join some of our colleagues on the steps of the capitol for an observance or do we better honor their lives and their loss by continuing to do our work here today? we believe the best way is for us to continue doing that. we'll continue going through the 11:00 hour and give us a chance to really drill down on some of these important issues. with that having been said, let me yield to dr. coburn. >> well, thank you, mr. chairman. couple points on what i heard here today. the homeland security budget is twice what it was when you had it. everybody knows we're resource poor right now. and the question is how do you put metrics on what homeland is doing? number one, there's
that's setting the policy and dealing with the data, not the national security agency. so what i would say is maybe d.h.s. doesn't need so much a bigger dog as a leash. and authorizing legislation can provide that kind of reassurance to the american people. >> thank you for those comments. how do we better honor the loss of all those lives 2 years ago this morning? do -- 12 years ago this morning? do we join some of our colleagues on the steps of the capitol for an observance or do we...
18
18
tv
eye 18
favorite 0
quote 0
but the national security agency has seen to crack the code and have been doing so at least since the year two thousand this according to the latest secret documents leaked by former n.s.a. contractor edward snowden we now know that both the n.s.a. and its british counterpart the g c h q have made millions of attempts to gain access to encipher data sent over the internet according to the board cns a made a huge break breakthrough back in two thousand and ten when it found a way to monitor large amounts of data flowing through the world's fiber optic cables these spy agencies found ways to gain access to data sent through virtual private networks which are frequently used by businesses and privacy conscious users to conceal ip addresses that means that the digital scrambling used to protect trade secrets medical records and more have all been unscrambled by the u.s. and i say in addition the spying organization has been covertly working with the technology companies to get access to user data according to budget documents quote the n.s.a. spends more than two hundred fifty million dol
but the national security agency has seen to crack the code and have been doing so at least since the year two thousand this according to the latest secret documents leaked by former n.s.a. contractor edward snowden we now know that both the n.s.a. and its british counterpart the g c h q have made millions of attempts to gain access to encipher data sent over the internet according to the board cns a made a huge break breakthrough back in two thousand and ten when it found a way to monitor...
29
29
tv
eye 29
favorite 0
quote 0
security agency's access to those countries citizens data and i think that's a really important distinction that's kind of gotten lost in the wake of the snowden revelations that needs to be pointed out say what you will about how well our framework works we have a framework and it's a very good point a very astute point now as we were talking about little bit earlier back in two thousand and eleven the obama administration secretly won an appeal in the fight to court to reverse restrictions on the n.s.a. back in two thousand and eight and those restrictions dealt with the use of intercepted phone calls and e-mails so can you talk about this a little bit more what does this say about the n.s.a. so i suspect there will be an examination of that opinion or reexamination of that opinion to see whether or not that that ruling was was justified in terms of the needs i think as. pointed out as others have pointed out there are legitimate needs for surveillance to protect the country against threats the question is whether or not that effort to protect the country oversteps the protection of priva
security agency's access to those countries citizens data and i think that's a really important distinction that's kind of gotten lost in the wake of the snowden revelations that needs to be pointed out say what you will about how well our framework works we have a framework and it's a very good point a very astute point now as we were talking about little bit earlier back in two thousand and eleven the obama administration secretly won an appeal in the fight to court to reverse restrictions on...
15
15
tv
eye 15
favorite 0
quote 0
security agency contractor who made public documents that show that the n.s.a. and its international partners conducted mass mass surveillance of foreign nationals and u.s. citizens certainly these documents continue to be an embarrassment both to the n.s.a. and the american government paula thanks very much indeed for that that's all it is policy a lot of that in tel aviv. the spanish region of catalonia is celebrating its national day with a call for a break from madrid millions joined demonstrations last year to demand independence in the couple and president has promised a referendum on the issue in twenty fourteen or the surface in the separatist region. well they did it so let's just. let's say it. was a lady up in the building with. the lady still i mean even the oak this action to put pressure on the spanish government could close catalonia independence referendum and instantly of course catalonia to become an independent state that's sort of going to dozens of people taking part in this action today the big question for everyone watching this around the
security agency contractor who made public documents that show that the n.s.a. and its international partners conducted mass mass surveillance of foreign nationals and u.s. citizens certainly these documents continue to be an embarrassment both to the n.s.a. and the american government paula thanks very much indeed for that that's all it is policy a lot of that in tel aviv. the spanish region of catalonia is celebrating its national day with a call for a break from madrid millions joined...
85
85
Sep 6, 2013
09/13
by
ALJAZAM
tv
eye 85
favorite 0
quote 0
. >> well the national security agency has found ways to beat the inkreupgs that's designed to protect the privacy of just about everything you do online and that's the latest revolution from the nsa leaker edward snowden. >> reporter: the u.s. cyber spy agency has cracked many of the codes that are meant the keep sensitive communication private. according to new documents released by edward snowden the nsa has invested billions in custom design super fast computers to break inkreuptd communications including banking transactions, consumer e-commerce, corporate trade see krerbgts medical records and other confidential informs. the agency forced technology forced to provide it with the keys to their inkreupgs program. so that it can decode billions of e-mails, internet chats and phone calls in the u.s. and across the world. >> the 2010 briefing me mo brieo for the counterpart, the agency boasted of an aggressive multieffort to break widely used internet enncription technology. there's over 400 o 400 million s of g-mail. the documents have been shareed with the new york times, the guardi
. >> well the national security agency has found ways to beat the inkreupgs that's designed to protect the privacy of just about everything you do online and that's the latest revolution from the nsa leaker edward snowden. >> reporter: the u.s. cyber spy agency has cracked many of the codes that are meant the keep sensitive communication private. according to new documents released by edward snowden the nsa has invested billions in custom design super fast computers to break...
142
142
Sep 8, 2013
09/13
by
CNNW
tv
eye 142
favorite 0
quote 0
the "new york times" published a story, too, this one so what it called the national security agency's secret war on the technology that ensures privacy on line. the reports the times, the agency has cracked much of the encryption that guards global commerce and banking systems, protects sensitive gay take and automatically secures the e-mails, internet chats and phone calls of americans, all part of a super secret program code named bull run according to documents provided by edward j. snowden. no one has said snowden's information is wrong. and and a government official tells me there is much more. the generals in egypt apparently think several islamist tv stations were more than unreliab unreliable, so they shut them down. and also al gezira english, accused of spreading rumors and claims harmful to national security and threaten the country's unity. which otherwise is what, just fine? al jazeera denied the claims. and said it was fair and balanced. finally, melissa milano ends up being a tape about syria. just the basics, though. and it only takes two minutes. we'll leave it at tha
the "new york times" published a story, too, this one so what it called the national security agency's secret war on the technology that ensures privacy on line. the reports the times, the agency has cracked much of the encryption that guards global commerce and banking systems, protects sensitive gay take and automatically secures the e-mails, internet chats and phone calls of americans, all part of a super secret program code named bull run according to documents provided by edward...
83
83
Sep 7, 2013
09/13
by
ALJAZAM
tv
eye 83
favorite 0
quote 0
the importance that they you know ascribe to it for national security. so sure. the agencies sometimes overclassify things. but if it's top crest cod -- top secret code word, you believe it to be top secret. who owns those secrets? the government owns those secrets. for the better good al qaeda is plotting a major attack or that syria has deployed the syrian regime has deployed some chemical weapons or something, that's fine, they own that information and they decide to reveal it. of course there is discourse whether it's going to hample the capabilities - marm the capability of the nsa or otherwise. >> i don't have the republic article -- >> i was mistaken. it was -- >> it was the republica explanation of what happened. >> i'm sorry. >> why don't we go back to it and finish it off so you hear it. it said that it's certainly true that some number of bad actors possibly including would be terrorists, law enforcement or intelligence agencies. some of these bad actors may now change their behavior in response to our story. so again as to what richard was sa
the importance that they you know ascribe to it for national security. so sure. the agencies sometimes overclassify things. but if it's top crest cod -- top secret code word, you believe it to be top secret. who owns those secrets? the government owns those secrets. for the better good al qaeda is plotting a major attack or that syria has deployed the syrian regime has deployed some chemical weapons or something, that's fine, they own that information and they decide to reveal it. of course...
19
19
tv
eye 19
favorite 0
quote 0
and a national in security agencies how britain and the us to have been waging an undercover war on the internet encryption and digital scrambling as fresh leaks a show they can hack into even the most protected systems. if you just joined us a very warm welcome to you this is already here with three to one with a top top story now. al qaeda linked to rebels have attacked a christian a village in syria home to one of the world's oldest monasteries army has secured much of the township but residents say radical opposition fighters have seize a nearby hills and are firing indiscriminately out of the community and our correspondent in damascus maria for national reports. i tried to go to my little village shortly after we heard that the clashes erupted there and it's just one hour drive from damascus north of the capital but we were stopped by the army and warned that it could be a one way ticket because first of all the road from damascus to milo is not safe but even if we're lucky enough to get. to the village the clashes still continue there and the raw are still some snipers who are ac
and a national in security agencies how britain and the us to have been waging an undercover war on the internet encryption and digital scrambling as fresh leaks a show they can hack into even the most protected systems. if you just joined us a very warm welcome to you this is already here with three to one with a top top story now. al qaeda linked to rebels have attacked a christian a village in syria home to one of the world's oldest monasteries army has secured much of the township but...
71
71
Sep 10, 2013
09/13
by
CSPAN
tv
eye 71
favorite 0
quote 0
just as you have your high-tech kind of well-known national security agencies that deal with threats to the global, when you are dealing with local threats and lone wolves, it is police boots on the ground, local --lks, community leaders with who have got to be part of the process of identifying threats. >> right here. right here, second row. >> mr. secretary, i wanted you to address the boston marathon. you said communication is key but in that situation one problem was communication between certain departments and government and certain governments. >> the full facts are not in and i do not want to speculate. you have to look at this and-- in several stages. one set of questions will be, why? somehow they lost track of tsarnaev, the older one, when he went over to chechnya and was over there for a few months. why there was not an alert on that? why was the russian warning not integrated or taken seriously? the second set of issues is whether within the u.s. government where people did have warning, how come they did not pursue further communication? i do not know the answer but tha
just as you have your high-tech kind of well-known national security agencies that deal with threats to the global, when you are dealing with local threats and lone wolves, it is police boots on the ground, local --lks, community leaders with who have got to be part of the process of identifying threats. >> right here. right here, second row. >> mr. secretary, i wanted you to address the boston marathon. you said communication is key but in that situation one problem was...
92
92
Sep 12, 2013
09/13
by
CSPAN
tv
eye 92
favorite 0
quote 0
that's setting the policy and dealing with the data, not the national security agency. so what i would say is maybe d.h.s. doesn't need so much a bigger dog as a leash. and authorizing legislation can provide that kind of reassurance to the american people. >> thank you for those comments. how do we better honor the loss of all those lives 2 years ago 12 years ago this morning? do we join some of our colleagues on the steps of the capitol for an observance or do we better honor their lives and their loss by continuing to do our work here today? we believe the best way is for us to continue doing that. we'll continue going through the 11:00 hour and give us a chance to really drill down on some of these important issues. with that having been said, let me yield to dr. coburn. >> well, thank you, mr. chairman. couple points on what i heard here today. the homeland security budget is twice what it was when you had it. everybody knows we're resource poor right now. and the question is how do you put metrics on what homeland is doing? number one, there's 45 opened areas from
that's setting the policy and dealing with the data, not the national security agency. so what i would say is maybe d.h.s. doesn't need so much a bigger dog as a leash. and authorizing legislation can provide that kind of reassurance to the american people. >> thank you for those comments. how do we better honor the loss of all those lives 2 years ago 12 years ago this morning? do we join some of our colleagues on the steps of the capitol for an observance or do we better honor their...
142
142
Sep 6, 2013
09/13
by
ALJAZAM
tv
eye 142
favorite 0
quote 0
they say they got the information in documents leaked by former national security agent edward snowden. >> reporter: the u.s. cyberspy agency has cracked many of the codes a that are meant to keep internet information private. since contractor edward snowden, the nsa has invested billions of dollars to break encrypted communications including banking transactions, consumer e-commerce, medical records and other ostensibly confidential information. they forced technology companies to provide keys to their inscription programs to e-mails and chats in the u.s. and across the world. the government communications headquarters, the agency boasted of an aggressive multi-pronged effort to break widely used interrupt encryption technologies saying that fast amountvastamounts of online datw being exploited. the british agency reported they had developed access opportunities to google's encrypted traffic. there are over 400 us 400 millis of g mail, and include yahoo, facebook and hot mail. the information from eric snowden has been shared with the guardian and others. the new poll released by the
they say they got the information in documents leaked by former national security agent edward snowden. >> reporter: the u.s. cyberspy agency has cracked many of the codes a that are meant to keep internet information private. since contractor edward snowden, the nsa has invested billions of dollars to break encrypted communications including banking transactions, consumer e-commerce, medical records and other ostensibly confidential information. they forced technology companies to...
1,434
1.4K
Sep 6, 2013
09/13
by
KQED
tv
eye 1,434
favorite 0
quote 0
security agency or n.s.a. and like other disclosures, the latest information comes from documents provided by former n.s.a. contractor edward snowden. in this case, the reporting was done by a partnership of "the new york times," pro-publica and "the guardian." reporters found the n.s.a. is able to crack through encryption or protective encoding tools that are used by businesses, banks, social media and other kinds of online commerce. for example, it's often assumed that when you purchase a product online or bank online with a secured and locked h.t.t.p.s. connection, you have protected your password and financial information. but the news reports say the n.s.a. can unlock that information. nicole perlroth is a cybersecurity reporter with "the new york times." she joins us from san franciso. so, nicole, how significant is this? >> this is huge. this was the last bastion of privacy on the internet and what we've discovered is that the last few decades, the n.s.a. has been actively working to crack or circumvent
security agency or n.s.a. and like other disclosures, the latest information comes from documents provided by former n.s.a. contractor edward snowden. in this case, the reporting was done by a partnership of "the new york times," pro-publica and "the guardian." reporters found the n.s.a. is able to crack through encryption or protective encoding tools that are used by businesses, banks, social media and other kinds of online commerce. for example, it's often assumed that...
64
64
Sep 10, 2013
09/13
by
CSPAN
tv
eye 64
favorite 0
quote 0
just as you have your high-tech kind of well-known national security agencies that deal with threats that are global, when you are dealing with local threats and lone wolves, it is police boots on the ground, local folks, community leaders who have got to be part of the process of identifying threats. >> right here. right here, second row. >> mr. secretary, i wanted you to address the boston marathon. you said communication is key but in that situation one problem was communication between certain departments and government and certain governments. >> the full facts are not in and i do not want to speculate. you have to look at this in several stages. one set of questions will be, why? somehow they lost track of tsarnaev, the older one, when he went over to chechnya and was over there for a few months. why there was not an alert on that? why was the russian warning did not integrated or taken seriously? the second set of issues is whether within the u.s. government where people did have warning, how come they did not pursue further communication? i do not know the answer but that's a
just as you have your high-tech kind of well-known national security agencies that deal with threats that are global, when you are dealing with local threats and lone wolves, it is police boots on the ground, local folks, community leaders who have got to be part of the process of identifying threats. >> right here. right here, second row. >> mr. secretary, i wanted you to address the boston marathon. you said communication is key but in that situation one problem was communication...
113
113
Sep 12, 2013
09/13
by
CSPAN
tv
eye 113
favorite 0
quote 0
security agency. i am really worried about where we are rowing in the growing sense of isolationism is concerning. if we do not start getting it right, we're going to be in a lot of trouble when it comes to providing intelligence services the tools that they need to protect this country. all worked up about that. >> just getting the facts right. [applause] for we get criticized giving the facts. we oversee the intelligence community. we make sure they follow the law, but they also have to put the facts on the table. when you get the allegations like the mated data -- metadata program, that is not the case, but we have to deal with the perception. some of the things we're doing, we are trying to make sure we can declassify more information really get people more information so they know we are always following the law but also trying to protect the american people. the head of all qaeda -- al qaeda will start targeting more in the united states and allies. the leave me, we are more all marble because o
security agency. i am really worried about where we are rowing in the growing sense of isolationism is concerning. if we do not start getting it right, we're going to be in a lot of trouble when it comes to providing intelligence services the tools that they need to protect this country. all worked up about that. >> just getting the facts right. [applause] for we get criticized giving the facts. we oversee the intelligence community. we make sure they follow the law, but they also have to...
184
184
Sep 6, 2013
09/13
by
CNBC
tv
eye 184
favorite 0
quote 0
are compromising online privacy for the sake of national security. the documents state that the nsa and its british counterpart, the government communications headquarters or gchq have been heading a secret deaded a lo de effort. they're using computers to crack web encryption coats through brute force and inserted secret back doors to access information they would normally be barred from thanks to digital scramb scrambling. it has reportedly cost the agency $225 million, just this year, and is designed to insert certain weak points into security systems that would be known only to the nsa itself. the problem is, as the times points out, these codes guard global commerce and banking systems, p systems, protect sensitive data and secures web searches, internet chats and phone calls of billions of people around the world. who could say what would happen if they fell into the wrong hands. the documents do not name specific companies or technologies, but they're reportedly working to penetrate encrypted traffic on what it calls the big four service provi
are compromising online privacy for the sake of national security. the documents state that the nsa and its british counterpart, the government communications headquarters or gchq have been heading a secret deaded a lo de effort. they're using computers to crack web encryption coats through brute force and inserted secret back doors to access information they would normally be barred from thanks to digital scramb scrambling. it has reportedly cost the agency $225 million, just this year, and is...